From 3de8f81c2aef50c58089390b0a2208b475bb8c23 Mon Sep 17 00:00:00 2001 From: Manfred Touron Date: Wed, 14 Aug 2019 20:04:32 +0200 Subject: [PATCH] chore: switch to id.pathwar.land --- .prod/keycloak/docker-compose.yml | 2 +- client/cmd_client.go | 2 +- client/cmd_client_claims.go | 4 ++-- web/public/keycloak.json | 2 +- 4 files changed, 5 insertions(+), 5 deletions(-) diff --git a/.prod/keycloak/docker-compose.yml b/.prod/keycloak/docker-compose.yml index e102c9d72..6ff45103b 100644 --- a/.prod/keycloak/docker-compose.yml +++ b/.prod/keycloak/docker-compose.yml @@ -7,7 +7,7 @@ services: environment: # specific to prod - PROXY_ADDRESS_FORWARDING=true - - VIRTUAL_HOST=sso.pathwar.land,auth.pathwar.land + - VIRTUAL_HOST=id.pathwar.land # common with dev - VIRTUAL_PORT=8080 - DB_VENDOR=MYSQL diff --git a/client/cmd_client.go b/client/cmd_client.go index f2bb115a0..0e6bbd7aa 100644 --- a/client/cmd_client.go +++ b/client/cmd_client.go @@ -36,7 +36,7 @@ func (cmd *clientCommand) ParseFlags(flags *pflag.FlagSet) { flags.StringVarP(&cmd.opts.Token, "token", "", "", "SSO Token") flags.StringVarP(&cmd.opts.Client, "sso-client", "", "platform-cli", "SSO Client") flags.StringVarP(&cmd.opts.Realm, "realm", "", "Pathwar-Dev", "SSO Realm") - flags.StringVarP(&cmd.opts.AuthURL, "auth-url", "", "https://sso.pathwar.land/auth", "SSO Authentication URL") + flags.StringVarP(&cmd.opts.AuthURL, "auth-url", "", "https://id.pathwar.land/auth", "SSO Authentication URL") flags.StringVarP(&cmd.opts.PublicKey, "public-key", "", "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAlEFxLlywsbI5BQ7DVkA66fICWGIYPpD+aZNYRR7SIc0zdtJR4xMOt5CjM0vbYT4z2a1U2yl0ewunyxFm8niS8w6mKYFnOS4nnSchQyIAmJkpLC4eAjijCdEHdr8mSqamThSrVRGSYEEsa+adidC13kRDy7NDKhvZb8F0YqnktNk6WHSlb8r2QRLPJ1DX534jjXPY6l/eoHuLJAOZxBlfwV5Dg37TVmf2xAH812E7ZigycLAvhsMvr5x2jLavAEEnZZmlQf4cyQ4tlMzKS1Zp0NcdOGS/i6lrndc5pNtZQuGr8IGBrEbTRFUiavn/HDnyalYZy8T5LakXRdVaKdshAQIDAQAB", "SSO Public Key") if err := viper.BindPFlags(flags); err != nil { zap.L().Warn("failed to bind viper flags", zap.Error(err)) diff --git a/client/cmd_client_claims.go b/client/cmd_client_claims.go index 99c89ef07..4f4cf55d6 100644 --- a/client/cmd_client_claims.go +++ b/client/cmd_client_claims.go @@ -48,9 +48,9 @@ func (cmd *claimsCommand) ParseFlags(flags *pflag.FlagSet) { func runClaims(opts *claimsOptions) error { // FIXME: add an option to automatically fetch the public key from - // https://sso.pathwar.land/auth/realms/Pathwar-Dev/protocol/openid-connect/certs + // https://id.pathwar.land/auth/realms/Pathwar-Dev/protocol/openid-connect/certs // or - // https://sso.pathwar.land/auth/realms/Pathwar-Dev + // https://id.pathwar.land/auth/realms/Pathwar-Dev tokenString := opts.client.Token claims := jwt.MapClaims{} token, err := jwt.ParseWithClaims(tokenString, claims, func(token *jwt.Token) (interface{}, error) { diff --git a/web/public/keycloak.json b/web/public/keycloak.json index a7832e698..8da16c966 100644 --- a/web/public/keycloak.json +++ b/web/public/keycloak.json @@ -1,6 +1,6 @@ { "realm": "Pathwar-Dev", - "auth-server-url": "https://sso.pathwar.land/auth", + "auth-server-url": "https://id.pathwar.land/auth", "ssl-required": "external", "resource": "platform-front", "public-client": true,